Skip to main content

CVE-2023-34050

Description

In spring AMQP versions 1.0.0 to 2.4.16 and 3.0.0 to 3.0.9 , allowed list patterns for deserializable class names were added to Spring AMQP, allowing users to lock down deserialization of data in messages from untrusted sources; however by default, when no allowed list was provided, all classes could be deserialized.

Specifically, an application is vulnerable if

* the SimpleMessageConverter or SerializerMessageConverter is used

* the user does not configure allowed list patterns

* untrusted message originators gain permissions to write messages to the RabbitMQ broker to send malicious content

NVD
Severity: MEDIUM
CVE ID: CVE-2023-34050
CVSS Score: 4.3
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
VMware
Severity: MEDIUM
CVE ID: CVE-2023-34050
CVSS Score: 5.0
CVSS Metrics: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H

Refrence: NVDMITRE

Proof Of Concept

X1r0z

PoC of Spring AMQP Deserialization Vulnerability (CVE-2023-34050)

Refrence: GitHub